Friday, July 23, 2021
Home Tags Adamantium-Thief

Tag: Adamantium-Thief

Must Need

Malware

What are the Types of Malware Infecting Your Computer

Malware is a malicious computer program that is designed to infect your system and gain access to sensitive information without the user's permission. Software...
Karonte : Static Analysis Tool To Detect Multi-Binary Vulnerabilities In Embedded Firmware

Karonte : Static Analysis Tool To Detect Multi-Binary Vulnerabilities In Embedded...

Karonte is a static analysis tool to detect multi-binary vulnerabilities in embedded firmware. Research Paper
Risk Assessment Framework : Static Application Security Testing

Risk Assessment Framework : Static Application Security Testing

The OWASP Risk Assessment Framework consist of Static application security testing and Risk Assessment tools, Eventhough there are many SAST tools available...
TaskManager Button Disabler : Simple Way To Disable/Rename Buttons From A Task Manager

TaskManager Button Disabler : Simple Way To Disable/Rename Buttons From A...

TaskManager Button Disabler is a simple way to disable/rename buttons from a task manager. Installation
Quark Engine : An Obfuscation-Neglect Android Malware Scoring System

Quark Engine : An Obfuscation-Neglect Android Malware Scoring System

Quark Engine is an Obfuscation-Neglect Android Malware Scoring System. Android malware analysis engine is not a new story. Every antivirus company...
Droidefense

Droidefense – Advance Android Malware Analysis Framework

Droidefense (originally named atom: analysis through observation machine)* is the codename for android apps/malware analysis/reversing tool. It was built focused on security issues and...
Bento : A Minimal Fedora-Based Container For Penetration Tests

Bento : A Minimal Fedora-Based Container For Penetration Tests

A bento (弁当, bentō) is a single-portion take-out or home-packed meal of Japanese origin. Bento Toolkit is a simple and minimal docker...